Size | 422.8KB |
---|---|
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed |
MD5 | 43d9c17b64418b880f53961ddf054197 |
SHA1 | 10e29105ba7d0db0afb02be3d1abec91d56beee5 |
SHA256 | 20526025a95ffa9f64999cf4710158d844abda8ae2d43934adb772980e0cb574 |
SHA512 |
2de068d6ccca482a26b24a5a3459ddc258c4732cbaab887c42718b07658c24117547312a468559811146ef0815a621a25bb6a19429e6ef8d5eedfd0d939e5df7
|
CRC32 | 8115404B |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Feb. 13, 2025, 5:18 a.m. | Feb. 13, 2025, 5:25 a.m. | 422 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-02-10 20:50:33,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-02-10 20:50:33,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\EKFQXREhbFMxZStIsQ 2025-02-10 20:50:33,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\fFkkoYBhVKMjEppGxxmkkK 2025-02-10 20:50:33,265 [analyzer] DEBUG: Started auxiliary module Curtain 2025-02-10 20:50:33,265 [analyzer] DEBUG: Started auxiliary module DbgView 2025-02-10 20:50:33,765 [analyzer] DEBUG: Started auxiliary module Disguise 2025-02-10 20:50:33,967 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-02-10 20:50:33,967 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-02-10 20:50:33,967 [analyzer] DEBUG: Started auxiliary module Human 2025-02-10 20:50:33,967 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-02-10 20:50:33,967 [analyzer] DEBUG: Started auxiliary module Reboot 2025-02-10 20:50:34,030 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-02-10 20:50:34,030 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-02-10 20:50:34,030 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-02-10 20:50:34,046 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-02-10 20:50:34,187 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\20526025a95ffa9f64999cf4710158d844abda8ae2d43934adb772980e0cb574.exe' with arguments '' and pid 1456 2025-02-10 20:50:34,375 [analyzer] DEBUG: Loaded monitor into process with pid 1456 2025-02-10 20:50:34,405 [analyzer] INFO: Added new file to list with pid 1456 and path C:\Windows\SysWOW64\sysctl.exe 2025-02-10 20:50:34,405 [analyzer] INFO: Added new file to list with pid 1456 and path C:\Windows\SysWOW64\realex.exe 2025-02-10 20:50:34,500 [analyzer] INFO: Injected into process with pid 592 and name u'sysctl.exe' 2025-02-10 20:50:34,655 [analyzer] DEBUG: Loaded monitor into process with pid 592 2025-02-10 20:50:35,187 [analyzer] INFO: Process with pid 1456 has terminated 2025-02-10 20:51:03,187 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-02-10 20:51:03,578 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-02-10 20:51:03,578 [lib.api.process] INFO: Successfully terminated process with pid 592. 2025-02-10 20:51:03,592 [analyzer] INFO: Analysis completed.
2025-02-13 05:18:23,388 [cuckoo.core.scheduler] INFO: Task #5931459: acquired machine win7x6416 (label=win7x6416) 2025-02-13 05:18:23,389 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #5931459 2025-02-13 05:18:23,859 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1853373 (interface=vboxnet0, host=192.168.168.216) 2025-02-13 05:18:24,162 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-02-13 05:18:24,958 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-02-13 05:21:43,333 [cuckoo.core.guest] INFO: Starting analysis #5931459 on guest (id=win7x6416, ip=192.168.168.216) 2025-02-13 05:21:44,427 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-02-13 05:21:49,455 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-02-13 05:21:49,519 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-02-13 05:21:50,723 [cuckoo.core.resultserver] DEBUG: Task #5931459: live log analysis.log initialized. 2025-02-13 05:21:51,640 [cuckoo.core.resultserver] DEBUG: Task #5931459 is sending a BSON stream 2025-02-13 05:21:52,163 [cuckoo.core.resultserver] DEBUG: Task #5931459 is sending a BSON stream 2025-02-13 05:21:52,311 [cuckoo.core.resultserver] DEBUG: Task #5931459 is sending a BSON stream 2025-02-13 05:21:52,877 [cuckoo.core.resultserver] DEBUG: Task #5931459: File upload for 'shots/0001.jpg' 2025-02-13 05:21:52,888 [cuckoo.core.resultserver] DEBUG: Task #5931459 uploaded file length: 135768 2025-02-13 05:22:05,467 [cuckoo.core.guest] DEBUG: win7x6416: analysis #5931459 still processing 2025-02-13 05:22:20,576 [cuckoo.core.guest] DEBUG: win7x6416: analysis #5931459 still processing 2025-02-13 05:22:21,182 [cuckoo.core.resultserver] DEBUG: Task #5931459: File upload for 'curtain/1739217063.39.curtain.log' 2025-02-13 05:22:21,188 [cuckoo.core.resultserver] DEBUG: Task #5931459 uploaded file length: 36 2025-02-13 05:22:21,305 [cuckoo.core.resultserver] DEBUG: Task #5931459: File upload for 'sysmon/1739217063.56.sysmon.xml' 2025-02-13 05:22:21,320 [cuckoo.core.resultserver] DEBUG: Task #5931459 uploaded file length: 1318084 2025-02-13 05:22:21,329 [cuckoo.core.resultserver] DEBUG: Task #5931459: File upload for 'files/cfa3afd8fbb7b732_sysctl.exe' 2025-02-13 05:22:21,334 [cuckoo.core.resultserver] DEBUG: Task #5931459 uploaded file length: 433632 2025-02-13 05:22:21,337 [cuckoo.core.resultserver] DEBUG: Task #5931459: File upload for 'files/ae0c756b0525ff1b_realex.exe' 2025-02-13 05:22:21,346 [cuckoo.core.resultserver] DEBUG: Task #5931459 uploaded file length: 433134 2025-02-13 05:22:21,706 [cuckoo.core.resultserver] DEBUG: Task #5931459: File upload for 'shots/0002.jpg' 2025-02-13 05:22:21,720 [cuckoo.core.resultserver] DEBUG: Task #5931459 uploaded file length: 133567 2025-02-13 05:22:21,732 [cuckoo.core.resultserver] DEBUG: Task #5931459 had connection reset for <Context for LOG> 2025-02-13 05:22:23,591 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-02-13 05:22:23,603 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-02-13 05:22:23,628 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-02-13 05:22:24,780 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/5931459/memory.dmp 2025-02-13 05:22:24,782 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-02-13 05:25:25,072 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #5931459 2025-02-13 05:25:25,509 [cuckoo.core.scheduler] DEBUG: Released database task #5931459 2025-02-13 05:25:25,544 [cuckoo.core.scheduler] INFO: Task #5931459: analysis procedure completed
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Create or check mutex | rule | win_mutex | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect private profile | rule | win_files_operation | ||||||
description | Affect hook table | rule | win_hook |
section | .imports |
file | C:\Windows\System32\realex.exe |
file | C:\Windows\System32\sysctl.exe |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX | ||||||
section | UPX2 | description | Section name indicates UPX |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sysctl.exe | reg_value | C:\Windows\system32\sysctl.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command\(Default) | reg_value | C:\Windows\system32\realex.exe "%1" %* |
G Data Antivirus (Windows) | Virus: Gen:Trojan.ShellReg.AqZ@aKr29ak (Engine A) |
Avast Core Security (Linux) | Win32:Malware-gen |
C4S ClamAV (Linux) | Win.Malware.Dacic-10014176-0 |
F-Secure Antivirus (Linux) | Trojan.TR/Crypt.XPACK.Gen3 [Aquarius] |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
eScan Antivirus (Linux) | Gen:Trojan.ShellReg.AqZ@aKr29ak(DB) |
ESET Security (Windows) | a variant of Win32/Delf.TPV trojan |
DrWeb Antivirus (Linux) | Trojan.DownLoad4.2230 |
ClamAV (Linux) | Win.Malware.Dacic-10014176-0 |
Bitdefender Antivirus (Linux) | Gen:Trojan.ShellReg.AqZ@aKr29ak |
Kaspersky Standard (Windows) | HEUR:Trojan-Dropper.Win32.Daws.gen |
Emsisoft Commandline Scanner (Windows) | Gen:Trojan.ShellReg.AqZ@aKr29ak (B) |
Bkav | W32.AIDetectMalware |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
CTX | exe.trojan.akr29ak |
ALYac | Gen:Trojan.ShellReg.AqZ@aKr29ak |
Cylance | Unsafe |
VIPRE | Gen:Trojan.ShellReg.AqZ@aKr29ak |
CrowdStrike | win/malicious_confidence_100% (D) |
K7GW | Trojan ( 005272dc1 ) |
K7AntiVirus | Trojan ( 005272dc1 ) |
Arcabit | Trojan.ShellReg.E7EC4B |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Delf.TPV |
APEX | Malicious |
ClamAV | Win.Malware.Dacic-10014176-0 |
Kaspersky | HEUR:Trojan-Dropper.Win32.Daws.gen |
BitDefender | Gen:Trojan.ShellReg.AqZ@aKr29ak |
NANO-Antivirus | Trojan.Win32.TrjGen.dteeek |
MicroWorld-eScan | Gen:Trojan.ShellReg.AqZ@aKr29ak |
Rising | Trojan.Delf!1.B509 (CLASSIC) |
Emsisoft | Gen:Trojan.ShellReg.AqZ@aKr29ak (B) |
F-Secure | Trojan.TR/Crypt.XPACK.Gen3 |
DrWeb | Trojan.DownLoad4.2230 |
Zillya | Trojan.Delf.Win32.90696 |
McAfeeD | Real Protect-LS!43D9C17B6441 |
Trapmine | malicious.high.ml.score |
Sophos | ML/PE-A |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.43d9c17b64418b88 |
Jiangmin | Trojan/Generic.bgqkt |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Crypt.XPACK.Gen3 |
Antiy-AVL | Virus/Win32.Expiro.imp |
Kingsoft | malware.kb.a.1000 |
Gridinsoft | Trojan.Win32.Packed.oa!s1 |
Xcitium | Packed.Win32.MUPX.Gen@24tbus |
Microsoft | Trojan:Win32/OnLineGames |
GData | Gen:Trojan.ShellReg.AqZ@aKr29ak |
Varist | W32/Trojan.NDEF-8555 |
AhnLab-V3 | Trojan/Win.OnLineGames.R685569 |
VBA32 | Trojan.Download |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Trojan.Delf.DDS |
Ikarus | Trojan.Win32.OnLineGames |
Tencent | Malware.Win32.Gencirc.10c08602 |
Yandex | Trojan.GenAsa!QBwe/GgoCFA |
huorong | HVM:Trojan/MalBehav.gen!A |
MaxSecure | Trojan.Malware.219324961.susgen |